UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

National Crime Agency (NCA) from the UK finally arrested the Teen for a heavy DDoS attack on ProtonMail email service.

19-year-old Teen George Duke-Cohan who was roaming on the internet under the name ‘7R1D3N7′, ‘DoubleParalla’ and ‘optcz1′, was launched a heavy DDoS attack on ProtonMail.

In this case, Protonmail faced a DDoS Attack on their network daily basis and five separate groups have been conducting this cyber attack.

George was one among the Russian cybercrime group “Apophis Squad” and he was involved in various cybercrime including several times for a number of DDoS attacks.

Also, he was responsible for making bomb threats to thousands of schools and a United Airlines flight traveling from the UK to San Francisco last month and he sent a mass email to schools in the UK and the US claiming that pipe bombs.

Also Read: Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

According to National Crime Agency, They investigators working with the FBI identified that whilst on pre-charge bail for the threats to schools, Duke-Cohan made bomb threats to the US-bound flight via phone calls to San Francisco Airport and their Bureau police.

 Apophis Squad cybercrime gang also claimed on their Twitter page that they are ultimately responsible for flight UAL 949 had been grounded.

In this case, ProtonMail started their investigation after the first attacks were launched, they found the attackers behind the Apophis Squad groups do not technically sound good and they found that some of the attackers in this group also ProtonMail users.

According to ProtonMail, Also George Duke-Cohan working with a number of hacking groups, On Aug. 31, officers from the British National Crime Agency (NCA) arrested Duke-Cohan outside of London.

“On Monday, he pleaded guilty in a UK court to three counts of making bomb threats to schools and airlines. We believe further charges are pending, along with possible extradition to the US.”

ProtonMail has been survived during the DDoS Attack due to the efforts of Radware, F5 Networks, and their own security team, they ware minimize the attack.

Protect website from future attacks Also Check your Companies DDOS Attack Downtime Cost.

So an organization should always ensure and focus on maximum Protection level for enterprise networks to Stop DDoS Attacks and you can try a free trial to Stop DDoS Attack in 10 Seconds.

Also Read

Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

DDoS Protection Bootcamp – Free Training Course to Improve Your DDoS Protection Skills

DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

NETGEAR buffer Overflow Vulnerability Let Attackers Bypass Authentication

Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…

2 days ago

5000+ CrushFTP Servers Hacked Using Zero-Day Exploit

Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…

2 days ago

13,142,840 DDoS Attacks Targeted Organization Around The Globe

DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…

2 days ago

Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike

Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…

2 days ago

Microsoft Publicly Releases MS-DOS 4.0 Source Code

In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…

2 days ago

New SSLoad Malware Combined With Tools Hijacking Entire Network Domain

A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…

2 days ago